Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:07 PM
Connect Directly

Another Hurdle For IPsec

Some organizations are taking a second look at IPsec for more security, but, like SSL, it also relies on a flawed trust model

With Secure Sockets Layer (SSL) continuously under siege and certificate authorities in the spotlight for data breaches, is it time for rival protocol IPsec to take center stage?

IPsec has some key features, like support for various algorithms and apps, including voice-over-IP, and it provides data packet-checking for authentication. But it has never really caught fire as a VPN protocol because of concerns about its client element and potential higher-maintenance management than SSL, which is widely available commercially. Even so, some organizations are taking a second look at IPsec and running it along with SSL for more security.

"We are seeing people returning to IPsec. They are seeing the benefits, and the pros and cons," says Rainer Enders, CTO at NCP Engineering Americas, which sells both SSL and IPsec products. "IPsec is a very robust set of protocols ... For really high security apps, IPsec makes a lot more sense. It offers more security through its design as a security protocol -- not [by] the type of encryption, but the implementation."

Enders says IPsec is actually more secure than SSL, in part because many SSL implementations still run older versions of its TLS protocol. The key exchange protocol in IPsec is better built and secured, he says. "IPsec is really more secure from a security technology perspective," he says.

But not so fast, security experts say. IPsec relies on the same web of trust that SSL does, and that model has collapsed, they say.

"I think IPsec is a perfect protocol to use, but I think we would be avoiding the real problem," says security expert Taher Elgamal, who led SSL development efforts at Netscape. "If we use IPsec, we still [need] to use some PKI. So if we do not address the real issue, which is how does a client trust a server certificate, then IPsec will have the exact same issues we have today. We can still have rogue CAs, and we would still have the MD5 problems."

Security expert Dan Kaminsky concurs. "As long as SSL is broken, IPsec isn't going to fix it," Kaminsky says. "After we fix SSL, [then] there are reasons to revisit IPsec."

The underlying problem, he says, goes beyond protocols and crypto. It's key management, which dogs both SSL and IPsec: "IPsec has the exact same key management issues as SSL, with two more problems. First, you have to get the protocol to work through NATs [network address translation] and firewalls. Second, the thing doing the encryption, the kernel, is far away from the thing that is communicating with the user, the app," Kaminsky says.

So the kernel doesn't know who to validate trust for, and the app struggles to show trust to the user, he says. "The advantage of IPsec is not that it's a better protocol. It's that without application integration, you still get crypto. To do that, though, you need amazingly robust key management so the kernel itself knows who to encrypt to," Kaminsky says.

Authenticity and confidentiality are key elements of any cryptographic system, notes Will Irace, director of research and services for Fidelis Security Systems. "What's broken is the web of trust to authenticate who you are talking to is who they say they are," Irace says. And IPsec and SSL rely on that same flawed web of trust, he says.

[ Many security experts believe the Internet's trust model is broken. Figuring out how to fix it will take time and collaboration. See The Future Of Web Authentication. ]

Fixing the certificate authority (CA) infrastructure is no small feat, however. Moxie Marlinspike has developed a Web authentication model called Convergence that uses an additional layer of oversight, known as notaries. Anyone could elect to act as a notary, but security companies and Web authentication experts would likely fill the bill there, creating histories of a website's SSL certificates and rating them for consistency. And users would decide whether to trust a website rather than rely on the browser to do it for them.

So will IPsec ever take off? "The advantage of IPsec is that it's built into IPv6," says Ben Greenberg, senior security threat researcher at Fidelis. "When enterprises go IPv6, they will already have it [built in] ... and can use it to secure internal communications."

And DNSSEC also could breathe life into IPsec. "Ultimately DNSSEC is going to be the answer for a lot of key management woes, and it will revitalize IPSec as much as it will fix SSL," Kaminsky says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
User Rank: Author
2/15/2012 | 6:59:46 PM
re: Another Hurdle For IPsec
Will Irace here. I didn't mean to suggest that IPsec has a flawed web of trust, just that there simply isn't an IPsec trust infrastructure that would allow us to abandon SSL even if we wanted to. I blogged about this very topic last fall. I do hope Dan is right about DNSSEC.
User Rank: Apprentice
2/27/2012 | 9:20:30 AM
re: Another Hurdle For IPsec

IPsec has some key features, like support for various algorithms and
apps, including voice-over-IP, and it provides data packet-checking for
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...